19. The electronic handwritten signatureverification technology includes a signature gathering system, and a signature verification system.
电子手写签名认证技术包括签名采集系统和签名认证系统。
来自互联网
20. Automatic signatureverification about Chinese character is to draw a conclusion if this Chinese character is written by a person specially.
汉字签名鉴别是通过对手写人的笔迹进行分析从而得出签名是否由某特定人书写的结论。
来自互联网
21. The paper proposes an online handwriting signatureverification algorithm with signature energy as feature based on dynamic time warping (DTW).
提出了一种基于DTW匹配的以签名能量为特征的在线手写签名验证算法。
来自互联网
22. Currently, the on-line signatureverification has applied in some areas, but the off-line signature verification has still stay in the laboratory.
目前在线手写签名检验技术已经进入实用阶段,而离线手写签名检验技术的效果还不太令人满意。
来自互联网
23. Signatureverification system uses the touch panel to collect signature data like horizontal coordinate, vertical coordinate, pressure information.
在线手写签名验证系统利用电阻式触摸屏采集手写水平位移、垂直位移、书写压力等签名信息;
来自互联网
24. Automatic off-line signatureverification techniques, especially, the detection of skilled forgeries have a great number of challenges to be solved.
自动脱机签名识别技术特别是熟练伪签名检测技术还存在着大量的关键问题亟待解决。
来自互联网
25. The DSS specifications include services for signature creation, signature verification, time-stamping, and a combination of the aforementioned capabilities.
DSS规范包括用于签名创建、签名检验、时间戳和上述功能集合的服务。
来自互联网
26. Together, these two objects let you seal and sign serialized data without having to stress about the details of digital signatureverification or encryption.
27. The signature process included four phases: system initialization, individual signature generation, group signature generation and signature verification.
签名过程分为四个阶段:系统初始化、生成个体签名、生成群签名以及签名验证。
来自互联网
28. In the existing authentication and encryption program, if the signer denies his signatures to any other receiver cannot verify the honesty of the signature verification.
现有的认证加密方案中,如果签名者否认签名,接收者不能向其它任何验证者证实签名者的诚实性。
来自互联网
29. The filling of the empty SOAP body with bogus content can now begin, as any of the operations denied by the attacker can be effectively executed due to the successful signatureverification.
30. In this article, an off-line Chinese signatureverification system based on pseudo feature and shape feature extraction is introduced, furthermore, we adopted 2-pass verification method.